Results 1 to 10 of about 12,484 (228)

Implementasi Enkripsi Data Secure Hash Algorithm (SHA-256) dan Message Digest Algorithm (MD5) pada Proses Pengamanan Kata Sandi Sistem Penjadwalan Karyawan

open access: diamondJurnal Teknik Elektro, 2018
There are various types of encryption that can be used, for example MD5 and SHA-256. However, using MD5 or SHA-256 alone is not safe enough because it can be solved by using a brute force attack.
Santi Sulastri, Riana Defi Mahadji Putri
doaj   +4 more sources

Performance analysis of MD5 [PDF]

open access: bronzeACM SIGCOMM Computer Communication Review, 1995
MD5 is an authentication algorithm proposed as the required implementation of the authentication option in IPv6. This paper presents an analysis of the speed at which MD5 can be implemented in software and hardware, and discusses whether its use interferes with high bandwidth networking.
Joseph D. Touch
openalex   +3 more sources

SHA-1 and MD5 Cryptographic Hash Functions: Security Overview [PDF]

open access: hybridCommunications, 2015
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj   +2 more sources

Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC [PDF]

open access: bronze, 2009
In this paper, we present the first distinguishing attack on HMAC and NMAC based on MD5 without related keys, which distinguishes the HMAC/NMAC-MD5 from HMAC/NMAC with a random function. The attack needs 297 queries, with a success probability 0.87, while the previous distinguishing attack on HMAC-MD5 reduced to 33 rounds takes 2126.1 messages with a ...
Xiaoyun Wang   +4 more
openalex   +3 more sources

A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document

open access: yesIEEE Access, 2020
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj   +2 more sources

Architecture based on MD5 and MD5-512 Bit Applications

open access: bronzeInternational Journal of Computer Applications, 2013
Researchers have found many flaws in hash function such as MD5 algorithm. It has been one of the most widely used hash algorithm and it has been indicated that there is a security threat in the algorithm. Furthermore, a MD5 hash output may not offer sufficient protection in the near future.
Vandana Pandey, Vipul Kumar Mishra
openalex   +3 more sources

SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)

open access: yesBuana Information Technology and Computer Sciences, 2022
This paper discusses the comparison of the results of testing the OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to the Reconciliation Application of the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten ...
Fahmi Basya   +2 more
doaj   +2 more sources

Dynamic Changes in Viral Loads during Co-Infection with a Recombinant Turkey Herpesvirus Vector Vaccine and Very Virulent Marek’s Disease Virus In Vivo [PDF]

open access: yesViruses
Marek’s disease (MD), caused by the Marek’s disease virus (MDV), is a common infectious tumor disease in chickens and was the first neoplastic disease preventable by vaccination.
Tian Ding   +9 more
doaj   +2 more sources

Influence of Training Load on Muscle Contractile Properties in Semi-Professional Female Soccer Players Across a Competitive Microcycle: A Pilot Study [PDF]

open access: yesSensors
This study aimed to evaluate changes in muscle contractile properties during a training microcycle in semi-professional female football players and explore their relationship with training load variables.
Ezequiel Rey   +4 more
doaj   +2 more sources

Key Change Strategies for TCP-MD5

open access: green, 2007
The TCP-MD5 option is most commonly used to secure BGP sessions between routers. However, changing the long-term key is difficult, since the change needs to be synchronized between different organizations. We describe single-ended strategies that will permit (mostly) unsynchronized key changes.
Steven M. Bellovin
openalex   +5 more sources

Home - About - Disclaimer - Privacy